Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Eric Brophy

Prepare for Ransomware Attacks – What to Know

Ransomware-Attacks

Cyberattacks are starting to hit harder than ever – and they are hitting every sector.

Ransomware attacks are becoming more vicious and impactful to our clients. Here are some high-level thoughts on preparing for the next attack.

Ransomware attacks are nothing new, they have been around for ages – the first documented attack being in 1989 known as the AIDS Trojan. This attack set the stage for the more sophisticated attacks we are seeing more frequently today. Infections have steadily increased every year since 2013, reaching record levels last year in 2017.

Recently, these infections have become more advanced and more dangerous. Hackers are now making their software harder to detect. Attackers can now also combine attacks by crafting a software to first hack into a network and then build a second software to capture the keystrokes of the users. With these attacks becoming more complex, it is important to ensure your organization is actively working on security practices and adding layers of protection constantly.

Continue reading
  1090 Hits
  0 Comments
Matt Scherocman

Protecting your Organization from Cyber Criminals with Microsoft Solutions

Protecting your Organization from Cyber Criminals with Microsoft Solutions

In any modern workplace, there is a constant threat of a security breach. Whether it is through ransomware placed in emails or a form of malware, a breach can be right around the corner. It is imperative to know where to look. Luckily with briefings such as the California’s 2016 Annual Data Breach Report and Symantec’s 2017 Internet Security Threat Report we can see the type of attacks and tools cyber criminals are using to target organizations. According to California’s 2016 Data Breach Report, malware and hacking was the cause of 44.6 million records breached, and it has continued to grow by over 22% in the past four years. This shows why it's so important to always have your organization’s security in mind and to have security measures in place.

Continue reading
  1637 Hits
  0 Comments
Matt Scherocman

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

The Struggle is Real: How to Deal with the Growth and Sophistication of Cybercrime with Microsoft Advanced Threat Analytics

As business changes and technology evolves, the majority of organizations depend on IT systems to store their data and run critical workflows. Unfortunately, these systems can be a prime target for cyber-attacks as sophisticated hackers put the enterprise in a vulnerable position. Just take note of these especially stunning stats:

  • 76% of attacks stem from compromised user credentials
  • The average cost of a data breach to a company is $3.5 million and total cost of cybercrime on a global scale is as high as $500 billion
  • Because of dangerous IT security blind spots (shown in the image below), it could take over 200 days to detect an attack

    IT blind spots Microsoft Advanced Threat Analytics

Stats courtesy of Microsoft Advanced Threat Analytics Datasheet.

The reality is, businesses need to pay attention and adapt to this changing nature of data security threats.

Now available in the Enterprise Mobility Suite, Microsoft Advanced Threat Analytics (ATA) helps to protect your company from attacks by leveraging machine learning. It uses behavioral analytics to uncover suspicious behavior, internally or from external attacks. It also detects known security issues and risks , the goal is to stay  one (or two, or three) steps ahead of the attackers.

Microsoft Advanced Threat Analytics

When you think of security software, your mind might immediately turn to configuring system rules and alerting. All of which take time and commitment from your team. With ATA, you don’t need to create rules, baselines, or thresholds. It’s streamlined from setup and works immediately. Once a threat is detected, it’s also easy to view a timeline of when the attack hit. It can help pinpoint where the breach took place. All of this insight can better prepare you for future attacks.

The thought of being hacked and not even knowing it is scary enough, but ATA also helps identify internal threats like why a user would be accessing files in accounting if they’re in the marketing department? Combined with online security reports, ATA can show anomalies for logins.  It will help detect when user credentials have been compromised by reporting geographically distant logins that occur at the time time – like a single user being logged in from Ohio and from Romania at the same time.  

The high-level benefits of using ATA at your business are obvious. Peace of mind goes a long way, and you also want it to help you adapt as cyber-attacks grow in frequency and sophistication. The features of ATA are even more appealing when you see exactly how it works for your business. Here are a few of our favorites:

  • Timeline: We’ve already mentioned that timeline, but it’s worth noting again. In addition to listing the activities as they occur, ATA provides recommendations on how to handle that alert.
  • Organizational Security Graph: This maps out entity interactions which represents the context and activities of the users, devices, and resources. This will be a big driver in managing security for each of your users.
  • Email Alerts: There’s no need for one person to be continuously monitoring for cyber-attacks. With ATA, you can have emails sent to users or groups when suspicious activity is detected.
  • Leveraging the Cloud:  Microsoft cloud based correlation engine helps more quickly identify new attacks and reduce the amount of false positives. 

The cyber-attack threat is real and ATA can help you adapt to the changing cyber-attack world we live in.

Contact Interlink if you any questions.

 

Continue reading
  2044 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.